Defending the Republic
Claudeland Armed Forces
Non-nuclear deterrence through the Ironhedge Doctrine — layered defense, cyber resilience, and civilian control.
Defending the Republic
Non-nuclear deterrence through the Ironhedge Doctrine — layered defense, cyber resilience, and civilian control.
Force Structure
Five branches structured for defensive excellence — no power projection, no aircraft carriers, no strategic bombers. Forces are dispersed across all eight regions.
Territorial defense, infantry, anti-armor, anti-air, and engineering. Organized into two light infantry divisions and five independent brigades covering all eight regions. The heaviest ground vehicle is the wheeled IFV — no main battle tanks.
Patria AMV-type 8x8 wheeled IFV with 30mm autocannon, ATGM launcher, and active protection system.
Wheeled SPH (CAESAR/Archer class). 40+ km range standard, 60+ km with rocket-assisted rounds. GPS-guided precision munitions.
HIMARS-class wheeled MLRS. GMLRS guided rockets (70+ km) and ATACMS-class (300 km). Deep fires and counter-battery.
Javelin/Spike-class vehicle- and man-portable ATGM with top-attack capability. Layered kill zones along canalized routes.
NASAMS-class ground-based air defense. 48 launchers across 2 regiments covering population centers and military installations.
Light attack helicopters for close air support and anti-armor. Army Aviation Battalion also operates 24 utility helicopters and 36 tactical UAVs.
Air defense, maritime patrol, airlift, and drone operations. Multi-role fighters optimized for defensive counter-air over home territory with ground-based radar support. Distributed basing with 6 highway dispersal strips.
54 Gripen E-class (4.5+ gen). AESA radar, Meteor BVR missiles, IRIS-T WVR, anti-ship missiles. 3 squadrons plus 12 attrition reserve (66 total airframes). Road-base capable.
P-8 Poseidon-class. 8+ hours on station. Surface search radar, MAD, sonobuoys, anti-ship missiles, torpedoes. Wide-area maritime domain awareness.
Layered IADS: 6 medium-range SAM batteries (NASAMS 3-class, 40-120 km), 12 SHORAD batteries (IRIS-T SLM, 15-40 km), 36 VSHORAD systems, 500+ MANPADS.
12 C-130J-class medium transports and 4 A400M-class heavy transports. Can lift 1 infantry battalion in a single sortie. Plus 3 VIP/government aircraft.
12 MQ-9B-class for persistent ISR (24+ hour endurance). NOT armed autonomously. Weapons integration only with human-in-the-loop controls. Plus 36 tactical UAVs.
300+ Switchblade 600/Harop-class. Human operator selects and authorizes each engagement individually. Classified as precision munitions, not autonomous weapons.
Network defense, offensive cyber (wartime), and signals intelligence. The most investment-efficient branch — every CL$1 invested in cyber defense yields approximately CL$7 in prevented infrastructure damage. Offensive cyber operations require the same authorization as kinetic military force.
3,500 personnel. 24/7 monitoring of military networks and 16 critical civilian infrastructure sectors. 6 rapid-response CERTs deployable within 4 hours.
1,500 personnel. Network intrusion teams, implant development, effects operations. Pre-positioned access for crisis response. Chancellor authorization required for use.
1,500 personnel across 3 ground stations, 2 airborne SIGINT aircraft, shipborne SIGINT on all 8 frigates, and 2 SIGINT satellites. All collection requires judicial warrants for domestic targets.
1,000 personnel. Tactical EW platoons attached to each brigade. Strategic high-power jamming, GPS spoofing/denial. Spectrum management and deconfliction.
Threat assessment, counter-intelligence, and strategic analysis. Focused exclusively on external military threats — domestic surveillance is constitutionally prohibited. Coordinates with NBI on counter-intelligence and CIS on foreign threats.
1,500 personnel producing threat assessments, defense planning intelligence, and foreign military capability analysis. Annual Threat Assessment feeds all defense planning.
1,800 personnel operating HUMINT networks, OSINT analysis, technical collection systems, and the defense attache network across partner nations.
1,200 personnel protecting CDF personnel, facilities, and information from adversary intelligence services. Enhanced vetting for all cleared personnel.
800 personnel conducting satellite imagery analysis, mapping, and targeting support. 4 Earth observation satellites (2 electro-optical, 2 SAR) with sub-meter resolution.
Grand Strategy
Named for the dense, thorned coastal hedgerows native to the peninsula — make any attack so costly that rational actors will never attempt it. Minimum 5:1 cost-imposition ratio across all phases of conflict.
Territorial defense through hardened homeland positions, distributed logistics, and prepared defensive lines. Anti-ship missile batteries on coastal highlands. Engineering obstacles and pre-registered artillery across the peninsula neck (120 km frontage). Cost multiplier: 6-10x for attackers on approach.
Bilateral defense partnerships with the US, UK, France, Germany, Australia, Japan, and Canada. NATO Enhanced Opportunities Partner. An attack on Claudeland triggers simultaneous responses from multiple partners, multiplying the cost to any aggressor beyond bilateral confrontation.
Credible retaliatory cyber capability imposing infrastructure costs on any attacker. 8,000-strong Cyber Command with both offensive and defensive capabilities. Pre-positioned access for crisis response. CL$4B annual investment yields CL$20B+ in imposed costs.
Constitutional prohibition on nuclear weapons. Deterrence achieved through five reinforcing layers: alliance architecture, conventional military capability, cyber deterrence, economic entanglement (sanctions capacity, supply chain leverage), and societal resilience (32 million educated citizens, 40,000 trained reservists).
National Intelligence Assessment
Assessed threat actors as of March 2026. Each actor rated across five domains: military, cyber, economic, information, and intelligence.
| Threat Actor | Type | Capability | Intent | Composite Score | Risk Level | Trend |
|---|---|---|---|---|---|---|
| REDWALL | Peer authoritarian superpower | ~900K military, nuclear, advanced cyber, combat experience | Sphere-of-influence expansion, democratic erosion, alliance fracturing | 7.55 | HIGH | Stable (persistent) |
| EASTGATE | Rising revisionist power | ~2M military, world's largest navy shipbuilding, supply chain dominance | Technology acquisition, supply chain control, norm erosion | 6.75 | ELEVATED | Worsening |
| SHADOWWEB | Transnational asymmetric network | Growing cyber, IED/small arms, online radicalization, deep-fake emerging | Mass-casualty attacks, radicalization of nationals, ransomware | 3.50 | ELEVATED | Worsening (cyber) |
FY2026 Appropriations
1.8% of GDP against a constitutional cap of 3.0%. Published quarterly on the Open Data Ledger with line-item detail independently verified by the Bureau of Metrics.
| Branch | Total (CL$B) | Personnel | Equipment | R&D |
|---|---|---|---|---|
| Army | 14.80 | 8.20 | 2.90 | 0.50 |
| Navy | 11.60 | 4.30 | 3.80 | 0.60 |
| Air Force | 8.40 | 2.90 | 3.10 | 0.40 |
| Cyber Command | 4.10 | 1.60 | 0.70 | 0.80 |
| Joint / Ministry | 4.30 | 1.70 | 1.60 | 1.20 |
Ethical Constraints
Article 47 of the Constitution prohibits autonomous weapons. Every lethal decision requires specific human authorization for that specific engagement — no exceptions.
Claudeland Cyber Command (CLCC)
Cyberspace is a domain of warfare subject to the same constitutional constraints, authorization requirements, and oversight as kinetic operations. Mass surveillance is constitutionally prohibited.
Graduated four-tier capability from intelligence collection to destructive attack. Pre-positioned implants in designated adversary networks with failsafes (time-based expiration, kill-switches, anti-propagation controls).
National Cyber Defense Center (NCDC) provides 24/7 monitoring across military and critical civilian networks. AI-assisted anomaly detection with human-supervised response. Automated blocking for known threats; all offensive response requires human authorization.
Annual multi-nation cyber defense exercise testing interoperability and mutual assistance procedures with allied nations. CLCC also runs continuous internal red team operations and quarterly "AI-denied" scenarios.
CLCC is proportionally the most heavily invested branch, reflecting the high-probability nature of cyber threats in the modern environment.